Results 31 to 40 of about 981,149 (222)
Reconsidering the Security Bound of AES-GCM-SIV
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption scheme currently considered for standardization by the Crypto Forum Research Group (CFRG).
Tetsu Iwata, Yannick Seurin
doaj +1 more source
A Finer-Grain Analysis of the Leakage (Non) Resilience of OCB
OCB3 is one of the winners of the CAESAR competition and is among the most popular authenticated encryption schemes. In this paper, we put forward a fine-grain study of its security against side-channel attacks.
Francesco Berti +6 more
doaj +1 more source
Understanding RUP Integrity of COLM
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function.
Nilanjan Datta +3 more
doaj +1 more source
Resource Mediated Competition of two South Texas Natives: _Acacia berlandieri_ and _Trichloris pluriflora_ [PDF]
*Background/Question/Methods* _Acacia berlandieri_, an early-successional C~3~ woody shrub legume, and _Trichloris pluriflora_, a late-successional/climax C~4~ mid-tall grass, reside in similar habitats and have both been documented in Texas ...
Paul N. Jurena, Sara J. Roach
core +2 more sources
Cube-like Attack on Round-Reduced Initialization of Ketje Sr
This paper studies the Keccak-based authenticated encryption (AE) scheme Ketje Sr against cube-like attacks. Ketje is one of the remaining 16 candidates of third round CAESAR competition, whose primary recommendation is Ketje Sr.
Xiaoyang Dong +3 more
doaj +1 more source
State-Recovery Attacks on Modified Ketje Jr
In this article we study the security of the authenticated encryption algorithm Ketje against divide-and-conquer attacks. Ketje is a third-round candidate in the ongoing CAESAR competition, which shares most of its design principles with the SHA-3 hash ...
Thomas Fuhr +2 more
doaj +1 more source
Current Development of Authenticated Encryption and its Usage in the TLS Protocol [PDF]
Tato práce se zaměřuje na přidání nové šifrovací sady s autentizovaným šifrováním do OpenSSL implementace TLS protokolu použitím EVP API. Nová šifra byla vybrána z přihlášených algoritmů do CAESAR soutěže.
Žák Jan
core
2D α‐Co(OH)2 interleaved with Mo species displays an appealing dual functionality for the production and use of green hydrogen.Mo incorporation greatly benefits the electrochemical behaviour in Oxygen Evolution Reaction for H2 production, while the magnetocaloric response at liquid H2 temperature paves the way for alternative cryogenic refrigerants ...
Daniel Muñoz‐Gil +14 more
wiley +1 more source
Assessing Agricultural Green Total Factor Productivity in Latin America
ABSTRACT The agricultural sector in Latin America plays a vital role in ensuring food security while impacting the environment. However, there remains a lack of analysis regarding the inputs responsible for pollution within its sub‐technologies. Hence, this article aims to assess agricultural green total factor productivity (TFP) through a novel ...
Tianxiang Li +2 more
wiley +1 more source
DPA Protected Implementation of OCB and COLM Authenticated Ciphers
Authenticated ciphers are designed to provide two security requirements simultaneously, i.e. confidentiality and integrity. The CAESAR competition was ended with introducing six authenticated ciphers for several applications as the winners.
Mohsen Jahanbani +2 more
doaj +1 more source

